CHAPTER 1 INTRODUCTION Section 1.1 Motivations: Security Based on Temporal Order Section 1.1.1 Formal Characterization of Time-series Section 1.1.2 BMQE System Section 1.1.3 Temporal Ordered Image Cryptography Section 1.1.4 Temporal Ordered Image Hiding Section 1.2 Objectives: Information Security Using Temporal Theory Section 1.3 Outlines of the Main Contributions Section 1.4 Book Structure CHAPTER 2 LITERATURE REVIEW Section 2.1 Temporal Basis Section 2.1.1 Point-based Systems Section 2.1.2 Interval-based Systems Section 7.1.3 A point & Interval-based Theory Section 2.1.4 Notion of Time-series Section 2.2 Ergodic Matrix Section 2.2.1 Finite Fields Section 2.2.2 Definitions and Related Theorems of the EM Section 2.2.3 Security Analysis of a Question Based on EM Section 2.3 Cryptography Section 2.3.1 History of Cryptography and Cryptanalysis Section 2.3.2 Symmetric Cryptography vs. Asymmetric Cryptography Section 2.3.3 Multivariate Quadratic Polynomials Section 2.4 Information Hiding Section 2.4.1 History of Information Hiding Section 2.4.2 Steganography vs. Watermarking Section 2.4.3 Data Hiding Technologies in Images Section 2.5 Conclusions CHAPTER 3 BMQE SYSTEM Section 3.1 Important Characteristics of EM for BMQE System Section 3.2 BMQE Based on Ergodic Matrix Section 3.2.1 BMQE Problem Section 3.2.2 BMQE is NP-Complete Section 3.3 Cryptanalysis of BMQE Section 3.3.1 Methods Used in Solving MQ-problems Section 3.3.2 Fixing Variables Section 3.3.3 Relinearization Section 3.4 Conclusions CHAPTER 4 IMAGE CRYPTOGRAPHY Section 4.1 Review of Image Cryptography Section 4.1.1 Characteristics of Image Cryptography Section 4.1.2 Image Cryptography Algorithms Section 4.2 Hybrid-key Based Image Cryptography Section 4.2.1 Encryption/Decryption and Authentication Process Section 4.2.2 Image Confusion Section 4.2.3 Image Diffusion Section 4.3 Security Analysis Section 4.3.1 Key Space Analysis Section 4.3.2 Statistical Analysis Section 4.3.3 Sensitivity-based Attack Section 4.4 Performance Evaluation Section 4.5 Conclusions CHAPTER 5 IMAGE HIDING Section 5.1 Related Results Section 5.1.1 GA-based Watermarking Section 5.1.2 SVM-based Watermarking Section 5.2 Design Idea Section 5.2.1 Motivation Section 5.2.2 Embedding Strength with SVM Section 5.2.3 Embedding Position with Optimized GA Section 5.3 Algorithm SOGA: Watermarking Based on SVM and Optimized-GA Section 5.3.1 Communication Procedure Section 5.3.2 Embedding Procedure Section 5.3.3 Extracting Procedure Section 5.4 Experimental Results Section 5.4.1 Evaluation Criterion in System Performance Section 5. d. 2 Results by Different Iteration Numbers Section 5.4.3 Robustness Against Various Attacks Section 5.5 Conclusion CHAPTER 6 TEMPORAL APPLICATIONS Section 6.1 Formal Characterization of Time-series Section 6.1.1 Why Choosing Temporal Section 6.1.2 Formalize the Characterization of Time-series Section 6.2 Temporal-based Image Cryptosystem Section 6.2.1 Eneryption-deeryption Process Using Temporal Logic Section 6.2.2 Expand the Key Size Section 6.2.3 Adjust the Images Section 6.2.4 Security Analysis Section 6.3 Temporal-based Image Hiding Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic Section 6.4 Conclusions CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS Section 7.1 Development of RFID Anti-counterfeit Technology Section 7.2 An Anti.counterfeiting Scheme for Agricultural RFID Section 7.3 BMQE for RFID Anti.Counterfeiting Section 7.3.1 Key Generation Section 7.3.2 Encryption Procedure Section 7.3.3 Decryption Procedure Section 7.4 SOGA for RFID Tampering Detection Section 7.5 Conclusions CHAPTER 8 CONCLUSIONS AND FUTURE WORK Section 8.1 Conclusions Section 8.2 Future Work Discussion Reference